Business Software for OpenShift Cloud Functions

Top Software that integrates with OpenShift Cloud Functions as of July 2025

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Keen

    Keen

    Keen.io

    Keen is the fully managed event streaming platform. Built upon trusted Apache Kafka, we make it easier than ever for you to collect massive volumes of event data with our real-time data pipeline. Use Keen’s powerful REST API and SDKs to collect event data from anything connected to the internet. Our platform allows you to store your data securely decreasing your operational and delivery risk with Keen. With storage infrastructure powered by Apache Cassandra, data is totally secure through transfer through HTTPS and TLS, then stored with multi-layer AES encryption. Once data is securely stored, utilize our Access Keys to be able to present data in arbitrary ways without having to re-architect your security or data model. Or, take advantage of Role-based Access Control (RBAC), allowing for completely customizable permission tiers, down to specific data points or queries.
    Starting Price: $149 per month
  • 2
    FusionReactor

    FusionReactor

    Intergral

    FusionReactor allows you to quickly find bottlenecks in your app, server, and in your database; making your Java or ColdFusion application run faster and more efficiently. The integrated production safe debugger helps you to quickly find bugs & alleviate technical debt allowing you more time to write better code. FusionReactor continually monitors your app and your database so when an error fires automatic root cause analysis will trigger and you will be immediately sent details of where the error occurred in your stack. No more hunting for that needle - you can dive straight in and fix the issue. Free trial available see https://www.fusion-reactor.com/start-free-trial/ You will find all the APM features you expect; plus some unique features you didn’t. FusionReactor is breaking the mold of traditional APM tools and will enable you to keep your production systems online longer and with better results
    Starting Price: $19 per month
  • 3
    IBM Kubecost

    IBM Kubecost

    Apptio, an IBM company

    IBM Kubecost provides real-time cost visibility and insights for teams using Kubernetes, helping you continuously reduce your cloud costs. Breakdown costs by any Kubernetes concepts, including deployment, service, namespace label, and more. View costs across multiple clusters in a single view or via a single API endpoint. Join Kubernetes costs with any external cloud services or infrastructure spend to have a complete picture. External costs can be shared and then attributed to any Kubernetes concept for a comprehensive view of spend. Receive dynamic recommendations for reducing spend without sacrificing performance. Prioritize key infrastructure or application changes for improving resource efficiency and reliability. Quickly catch cost overruns and infrastructure outage risks before they become a problem with real-time notifications. Preserve engineering workflows by integrating with tools like PagerDuty and Slack.
    Starting Price: $199 per month
  • 4
    Clarive

    Clarive

    Clarive Software

    Start your DevOps Journey, make application delivery easy with a simple, powerful and unified workflow. The road to continuous delivery starts here. Clarive is the first tool to deliver an integrated experience to both Dev and Ops. Define and schedule your milestones, quality gates and releases to match your product goals and ideas. Package source code or any artifact into changesets that support any review, test or deployment workflow. Follow your release progress through stages and environments while collaborating and iterating on kanban boards and topics. Automate release pipelines to provision infrastructure, resolve dependencies and deploy components. Ideal for Dev teams that want to get started with lean delivery and the right workflow. Replace redundant tools and save time and money. Ideal for Ops teams looking to centralize all delivery processes, coordinate silos and resolve application dependencies.
    Starting Price: €2 per user per month
  • 5
    BMC Helix Cloud Security
    Automated cloud security posture management. Designed for the cloud, in the cloud, BMC Helix Cloud Security takes the pain out of security and compliance for cloud resources and containers. Cloud security scoring and remediation for public cloud Iaas and PaaS services from AWS, Azure, and GCP. Automated remediation — no coding required. Container configuration security for Docker, Kubernetes, OpenShift, and GKE. Automated ticketing enrichment via ITSM integration. Ready-to-use CIS, PCI DSS, & GDPR policies, plus support for custom policies. Automated cloud server security management for AWS EC2 and MS Azure VMs. Your cloud footprint is constantly evolving, requiring a solution that accelerates agility without compromising security and compliance. BMC Helix Cloud Security is up to the challenge. Automated security checks and remediation for AWS, Azure, and GCP IaaS and PaaS services.
  • 6
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 7
    Grace Enterprise AI Platform
    The Grace Enterprise AI Platform, the AI platform with full support for Governance, Risk & Compliance (GRC) for AI. Grace offers an efficient, secure, and robust AI implementation across any organization, standardizing processes, and workflows across all your AI projects. Grace covers the full range of rich functionality your organization needs to become fully AI proficient and helps ensure regulatory excellence for AI, to avoid compliance requirements slowing or stopping AI implementation. Grace lowers the entry barriers for AI users across all functional and operational roles in your organization, including technical, IT, project management, and compliance, while still offering efficient workflows for experienced data scientists and engineers. Ensuring that all activities are traced, explained, and enforced. This includes all areas within the data science model development, data used for model training and development, model bias, and more.
  • 8
    SOAtest

    SOAtest

    Parasoft

    Anchored in artificial intelligence (AI) and machine learning (ML), Parasoft SOAtest simplifies the complexity of functional testing across APIs, UIs, databases, and more. Change management systems continuously monitor quality, making the API and web service testing tool a perfect fit for Agile DevOps environments. Parasoft SOAtest delivers fully integrated API and web service testing tools that automate end-to-end functional API testing. Streamline automated testing with advanced functional test-creation capabilities for applications with multiple interfaces (REST & SOAP APIs, microservices, databases, and more). The tools reduce the risk of security breaches and performance outages by transforming functional testing artifacts into security and load equivalents. Such reuse, along with continuous monitoring of API for change, allows faster and more efficient testing.
  • 9
    ARMO

    ARMO

    ARMO

    ARMO provides total security for in-house workloads and data. Our patent-pending technology prevents breaches and protects against security overhead regardless of your environment, cloud-native, hybrid, or legacy. ARMO protects every microservice and protects it uniquely. We do this by creating a cryptographic code DNA-based workload identity, analyzing each application’s unique code signature, to deliver an individualized and secure identity to every workload instance. To prevent hacking, we establish and maintain trusted security anchors in the protected software memory throughout the application execution lifecycle. Stealth coding-based technology blocks all attempts at reverse engineering of the protection code and ensures comprehensive protection of secrets and encryption keys while in-use. Our keys are never exposed and thus cannot be stolen.
  • 10
    ServiceNow IT Operations Management
    Predict issues, reduce user impact, and automate resolutions with AIOps. Move away from reactive IT operations with insights and automation. Identify anomalies and solve issues before they occur with cross-team automation workflows. Deliver proactive digital operations with AIOps. Stop chasing false positives and identify anomalies with less guesswork. Collect and analyze telemetry data for enhanced visibility and reduced noise. Find the root cause of incidents and share actionable insights across teams. Reduce outages by taking action based on guided recommendations. Shorten recovery times by rapidly implementing solutions based on insights. Simplify repetitive tasks with pre-built playbooks and knowledge base resources. Create a performance-driven culture across teams. Give DevOps and Site Reliability Engineers (SREs) visibility into microservices to improve observability and speed up incident response. Go beyond IT operations to manage the entire digital lifecycle.
  • 11
    Imvision

    Imvision

    Imvision

    How enterprises secure their APIs. Protect your APIs wherever they are, throughout their lifecycle. Gain visibility across the board and deeply understand the business logic behind your APIs. Uncover endpoints, usage patterns, expected flows, and sensitive data exposure through full API payload data analysis. By analyzing the full API data, Imvision allows you to go beyond predefined rules in order to discover unknown vulnerabilities, prevent functional attacks, and automatically shift-left to outsmart attackers. Natural Language Processing (NLP) allows us to achieve high detection accuracy at scale while providing detailed explainability. It can effectively detect ‘Meaningful Anomalies’ when analyzing API data as language. Uncover the API functionality using NLP-based AI to model the complex data relations. Detect behavior sequences attempting to manipulate the logic, at any scale. Understand anomalies faster and in the context of the business logic.
  • 12
    Caveonix

    Caveonix

    Caveonix

    Traditional enterprise security and compliance solutions tend to be unscalable within hybrid and multi-cloud environments. As other “cloud-native” solutions frequently leave existing data centers behind, it can be difficult for teams to secure their enterprise’s hybrid computing operating environments. From infrastructure and services to applications and workloads, your teams can confidently protect all your cloud environments. Created by industry veterans that know digital risk and compliance inside and out, Caveonix RiskForesight is a platform trusted by our customers and partners that provides proactive workload protection. Detect, Predict and Act on threats that occur in your technology stack and hybrid cloud environments. Automate your digital risk and compliance processes, and proactively protect your hybrid and multi-cloud environments. Implement cloud security posture management and cloud workload protection, as defined by Gartner's standards.
  • 13
    Azure Marketplace
    Azure Marketplace is a comprehensive online store that provides access to thousands of certified, ready-to-use software applications, services, and solutions from Microsoft and third-party vendors. It enables businesses to discover, purchase, and deploy software directly within the Azure cloud environment. The marketplace offers a wide range of products, including virtual machine images, AI and machine learning models, developer tools, security solutions, and industry-specific applications. With flexible pricing options like pay-as-you-go, free trials, and subscription models, Azure Marketplace simplifies the procurement process and centralizes billing through a single Azure invoice. It supports seamless integration with Azure services, enabling organizations to enhance their cloud infrastructure, streamline workflows, and accelerate digital transformation initiatives.
  • 14
    ThreatStryker

    ThreatStryker

    Deepfence

    Runtime attack analysis, threat assessment, and targeted protection for your infrastructure and applications. Stay ahead of attackers and neutralize zero-day attacks. Observe attack behavior. ThreatStryker observes, correlates, learns and acts to protect your applications and keep you one step ahead of attackers. Deepfence ThreatStryker discovers all running containers, processes, and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect vulnerable components and interrogates configuration to identify file system, process, and network-related misconfigurations. ThreatStryker assesses compliance using industry and community standard benchmarks. ThreatStryker performs deep inspection of network traffic, system, and application behavior, and accumulates suspicious events over time. Events are classified and correlated against known vulnerabilities and suspicious patterns of behavior.
  • 15
    ThreatMapper

    ThreatMapper

    Deepfence

    Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.
  • Previous
  • You're on page 1
  • Next